US20070079115A1 - Secure gateway with redundent servers - Google Patents

Secure gateway with redundent servers Download PDF

Info

Publication number
US20070079115A1
US20070079115A1 US11/242,964 US24296405A US2007079115A1 US 20070079115 A1 US20070079115 A1 US 20070079115A1 US 24296405 A US24296405 A US 24296405A US 2007079115 A1 US2007079115 A1 US 2007079115A1
Authority
US
United States
Prior art keywords
certificate
server
servers
secure communications
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/242,964
Other versions
US8046579B2 (en
Inventor
Roman Kresina
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Quadient Technologies France SA
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US11/242,964 priority Critical patent/US8046579B2/en
Application filed by Individual filed Critical Individual
Assigned to NEOPOST INDUSTRIE SA reassignment NEOPOST INDUSTRIE SA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KRESINA, ROMAN
Assigned to NEOPOST INDUSTRIE SA reassignment NEOPOST INDUSTRIE SA CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE'S ADDRESS PREVIOUSLY RECORDED ON REEL 017615 FRAME 0670. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT OF ASSIGNOR'S INTEREST. Assignors: KRESINA, ROMAN
Assigned to NEOPOST TECHNOLOGIES reassignment NEOPOST TECHNOLOGIES CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: NEOPOST INDUSTRIE S.A.
Priority to EP06815688A priority patent/EP1941648A4/en
Priority to PCT/US2006/037861 priority patent/WO2007044239A2/en
Publication of US20070079115A1 publication Critical patent/US20070079115A1/en
Publication of US8046579B2 publication Critical patent/US8046579B2/en
Application granted granted Critical
Assigned to QUADIENT TECHNOLOGIES FRANCE reassignment QUADIENT TECHNOLOGIES FRANCE CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: NEOPOST TECHNOLOGIES
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/125Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer

Definitions

  • the disclosed embodiments relate to a secure gateway to a postal service provider infrastructure that provides postal related services.
  • a high volume postal customer may use a meter which incorporates a Postal Security Device (PSD) to secure the proof of payment of postal indicia.
  • PSD Postal Security Device
  • indicia may be applied to mailing items that identifies the value of the postage applied and other information.
  • a customer may purchase postage and the purchased value may be stored in the PSD. As the postage indicia is applied to items, the value applied may be deducted from the stored value. Once postage indicia is applied, the item may then be dropped into the collection stream of the particular postal system and subsequently processed for delivery.
  • a customer generally purchases postage by having the meter communicate with a postal service infrastructure, either automatically or manually.
  • a secure gateway includes a TLS server for authenticating connecting devices, a connection manager for routing requests from the TLS server to service provider adapters, and a key management system for providing key management functions, wherein when a device provides a manufacturing certificate to one or more servers of the gateway, servers identify the device as authentic by validating that the manufacturing certificate provided is signed by the same root that has signed the servers its own certificate.
  • FIG. 1 shows an exemplary secure gateway application architecture
  • FIG. 2 shows a block diagram of a secure communications pipeline component overview
  • FIG. 3 shows a diagram of a hardware security module manager
  • FIG. 4 shows an example of system component interaction when a device connects to the secure communications pipeline
  • FIG. 5 shows a key hierarchy within hardware security modules
  • FIG. 6 shows a diagram of key management system component interaction
  • FIG. 7 shows an exemplary re-keying algorithm
  • FIG. 8 shows a process for key management system cluster validation
  • FIG. 9 shows component interaction for a device key manager
  • FIG. 10 shows an exemplary hardware deployment
  • FIGS. 11-13 show how device certificates are managed.
  • FIG. 1 shows a block diagram of a secure gateway architecture 100 suitable for practicing the embodiments disclosed herein.
  • a secure gateway architecture 100 suitable for practicing the embodiments disclosed herein.
  • the embodiments disclosed herein are directed to the secure gateway architecture 100 which may provide:
  • the secure gateway architecture 100 may be based upon an XML messaging architecture referred to herein as an XBUS.
  • the XBUS may be used as a communication mechanism between the various distributed components that comprise the secure gateway 100 .
  • a manufacturing system 105 could be implemented on its own XBUS network which would provide an easy mechanism for the various manufacturing workstations to communicate with various manufacturing server components.
  • This Manufacturing XBUS could then be bridged using an XBRIDGE to the main secure communications pipeline XBUS to make use of a Key Management System 110 that is on the secure communications pipeline XBUS.
  • the Key Management System (KMS) 110 GENERALLY provides Key Management services in response to request messages that are sent to it.
  • the secure gateway architecture 100 may include the following core components:
  • the secure communications pipeline server 115 may provide the basic security between a device (meter/base) 120 and the server infrastructure 100 .
  • the heart of the secure communications pipeline server 115 may be a TLS server 125 responsible for creating a mutually authenticated secure session between the device 120 and the infrastructure 100 .
  • the secure communications pipeline server 115 may provide service routing functionality between the device 120 and its intended service destination adapter via a secure communications pipeline Service Router (SSR) 130 .
  • SSR 130 may provide service routing control between the device 120 and the intended destination.
  • Adapters 135 An adapter 135 for each service provider may be provided that is supported by the secure gateway architecture 100 . These adapters 135 may communicate with the secure communications pipeline server 115 on behalf of a specific SSL/TLS device connection. Field devices may communicate with the adapters 135 using an application protocol specific to each adapter. The application messages may be transported between the secure communications pipeline server 115 and the specific adapter 135 in either a raw IP packet or wholly contained in an XBUS Message envelope as appropriate to the adapter implementation (IP/XBUS).
  • KMS Key Management System 110
  • the KMS component 110 may be implemented as an XBUS server to provide all of the necessary Key and Certificate management services needed by the secure gateway system.
  • a Device Keying Manager (DKM) 140 may be responsible for all of the business logic necessary for the re-keying of devices (Meter/Bases) in the field.
  • the DKM 140 acts as any other service or adapter in the secure gateway system 100 .
  • Event Logger (EL) 145 An EL component 145 may be used to log events that occur throughout the secure gateway system 100 . It is responsible for storing event information into a common repository and can also be queried to produce a filtered list of events that match a specified criterion.
  • AGUI Admin GUI
  • the AGUI component 150 may provide a user interface that is used to configure and maintain the secure gateway system.
  • the MI component 155 may be used by the manufacturing infrastructure 105 to communicate with services offered by on the secure gateway network. This interface may be primarily used by the manufacturing infrastructure 105 to access the Key Management services offered by the KMS 110 .
  • the secure gateway system 100 is able to provide a highly secure gateway to various infrastructure services/adapters using a three tier certificate hierarchy (Root, Region, Device) provided by the KMS component. Using this highly secure gateway, it is possible to route any application protocol from a field device to an infrastructure service.
  • a three tier certificate hierarchy (Root, Region, Device) provided by the KMS component.
  • the secure communications pipeline server 115 may be responsible for creation of a secure channel between the connecting device 120 and the secure gateway infrastructure 100 using a mutually authenticated TLS session and secure routing of service requests from TLS sessions to service adapters 135 .
  • This combination of capabilities provides a bi-directional secure pipeline between the connecting device 120 and the secure gateway Services Tier.
  • the device and server can assume the role of client, server or both, at different times.
  • Asynchronous communication can occur in either direction.
  • the TLS server 125 may be used to accept secure connections from outside devices to the secure communications pipeline.
  • This socket server may internally use a bank of Hardware Security Module's (HSM) 205 for the purpose of authentication in the TLS protocol negotiation process.
  • HSM Hardware Security Module's
  • the server When a secure connection is accepted by the TLS server 125 , the server sends a notification of a new connection to the secure communications pipeline Connection Manager(SCM) 210 .
  • SCM secure communications pipeline Connection Manager
  • SCM Secure Communications Pipeline Connection Manager
  • the SCM 210 is responsible for routing service requests to service provider adapters 135 based on certain criteria. If all criteria are valid the connection proceeds to the secure communications pipeline Service Router 130 , the SCM 210 may use an instance of the Service Routing Component 215 to complete the service route.
  • SSR Secure Communications Pipeline Service Router
  • the SSR 130 may include of a collection of service router objects that implement a common interface IServiceRouter, and a class factory to create them, including there are two types of Service Route objects, IP based router and XBus router.
  • the IP Based Router 215 routes connection to an IP Socket based service provider 135 a.
  • the XBUS Based Router 220 routes connections to an XBUS service provider 135 b.
  • the SSR 130 uses a service list to determine the type of service router for the class factory to instantiate. Once this is accomplished an internal session manager associates the session with the IServiceRouter objects, and transports all data between the session and the service through the IServiceRouter object.
  • IServiceRouter IServiceRouter
  • the IServiceRouter interface implemented by Service Routers may include of the following methods: CONNECT New connection occurred DISCONNECT Existing connection terminated INBOUND_MSG Message sent from device to service provider OUTBOUND_MSG Message sent from service provider to device.
  • Hardware Security Module Manager 225
  • the HSM Manager component 225 is responsible for maintaining a dynamic list of all HSM devices 205 that are currently available. As HSM devices 205 become available or as they are taken off line the HSM manager 225 may dynamically monitor the total number of HSM devices available. This component may also provide a set of messages or an interface to communicate the status of each HSM 205 to other system devices. For example, the interface would expose such messages as “GetHSMSummary”, ReKeyHSM” and “HSMEvents”.
  • Each HSM 205 is associated with one public/private key pair, that functions in a particular role. There may be multiple HSMs 205 for a particular role on the same machine. For example, the machine that hosts the secure communications pipeline server may contain multiples HSMs 205 , with some set of the total HSMs on that machine dedicated to the secure communications pipeline server for use in establishing SSL/TLS session.
  • the HSM Manager component 225 may transport the various messages, to and from devices.
  • FIG. 4 illustrates exemplary component interaction when a device connects in to secure communications pipeline.
  • the secure communications pipeline server 115 is also responsible for re-keying devices in the field which may be required in the following scenarios:
  • the device must be moved from the Manufacturing Security Region to the appropriate Security Region based on the customer. (Typically Country Specific)
  • the device's certificates are invalid, due to either a Root Key change, or a Region change.
  • the device's key pair is deemed to expire within a configurable period of time.
  • the secure communications pipeline server 115 is responsible for updating these credentials before a secure session can be created. This device re-keying may take place when the device connects to the secure communications pipeline server initially.
  • Certificate Verification This may allow the caller the ability to authenticate a certificate. This may return a response that may indicate if the certificate is verified or, if not, it may indicate why it was not verified.
  • Certificate Generation may allow the caller to create a certificate using a specified public key (as well as some other identifying information). This newly created certificate may be signed by a specified certification authority before being returned to the caller.
  • Certificate Retrieval This may be used to retrieve a specified certificate from the certificate store inside the KMS system.
  • Digital Signature This may return a digital signature using a specified regional certificate, an arbitrary block of data to sign as well as various parameter to specify the details of how the signing is to be accomplished.
  • Signature Verification Given a block of data and a signature, this method may be able to verify that the signature is correct.
  • Root Certificate Chain Retrieves the chain of root certificates up to a specified date or root certificate in the chain.
  • Certificate Revocation Provides a way to revoke a certificate based on its serial number or distinguished name.
  • Root Key At the top of the trust hierarchy, or level one, is the Root Key.
  • the Root key is the umbrella signatory for the rest of the hierarchy.
  • Level two shall have the Manufacturing, Active Regions and Special Function keys.
  • the Manufacturing key is the key under which devices shall be manufactured.
  • Active Regions are the keys which shall provide the “active” trust when deployed in a particular country or region.
  • the Special Function keys are for the purpose of signing software, rate tables, etc.
  • Level three shall consist of Client keys which would be at the customer (e.g. device key). Level three would also contain session establishment keys used to establish an active connection with a client.
  • FIG. 5 illustrates the hierarchy
  • HSM Hardware Security Modules
  • the secure communications pipeline server may use multiple HSM for SSL sessions, and the KMS may use multiple HSMs for a region.
  • the functionality of the HSM may be incorporated into a computing device secure by its inaccessibility.
  • Root chaining is the technique by which the current Root certificate has information about the next (child) Root. This is accomplished by inserting the hash of the next Root certificate into the Current Root certificate. In this manner when the Root is updated, the clients in the field can verify that the new Root is legitimate based upon the hash that was stored in the old Root certificate.
  • FIG. 6 illustrates the key management system component interaction
  • the KMS 110 may interact directly with many of the secure gateway components. The following is a description of those interactions:
  • the secure communications pipeline 115 uses the services of the KMS 110 in order to manage the HSM (Hardware Security Modules) 205 used to establish the secure connections.
  • HSM Hard Security Modules
  • DKM 140 uses the KMS services to perform Device Key Maintenance.
  • XBUS Service Manager (XSM) 610 The XSM 610 is responsible for launching and monitoring the KMS component 110 .
  • Event Logger (EL) 145 The KMS 110 uses the EL 145 to log events that are associated with Key Management. These events would include when a certificate is revoked, when a root or region is re-keyed, etc.
  • Services may be provided to any client that can connect to the KMS.
  • Protected services may be available only on the machine that hosts the KMS.
  • An exception may be identified if a system failure prevents one of the following operations from completing or invalid input was provided (e.g. an XBus failure, network failure, server failure, server error, out of memory, empty or invalid certificate chain, etc.)
  • the system may authenticate an entity based on a certificate (device, software, KMS server, client application, others as appropriate) and associated certificate chain. It may report back results of verification, with responses such as Verified, Verified Not Current, Verified Region Not Current, Verified Root Not Current, Not Verified, Valid Manufacturing Region, Valid Unknown Region, Invalid, Revoked. If the regional certificate authority is not one that is managed by this KMS instance, the system may check if the unknown regional certificate is correctly signed by the current root.
  • the system may also check that the certificate has not expired, and that it is not contained on the Certificate Revocation List (CRL) or the Distinguished Name Revocation List (DNRL).
  • CRL Certificate Revocation List
  • DNRL Distinguished Name Revocation List
  • the system may return a value to indicate if the certificate was verified, and if not, the reason for non-verification.
  • Authentication may be based on the number of certificates in the chain. CertificateStatus Meaning Verified The certificate is valid and the entire certificate chain is valid and up-to-date Verified Region The certificate is valid with Not Current respect to the certificate chain, but a newer middle-tier certificate is available. Verified Root Not The certificate is valid with Current respect to the certificate chain, but a newer root certificate is available. Not Verified The certificate or one or more of the certificates in the chain could not be verified.
  • Valid The certificate and Manufacturing certificate chain are valid Region and up-to-date, and the middle-tier certificate authority is the special manufacturing region Valid Unknown The certificate and Region certificate chain are valid and up-to-date.
  • the middle- tier certificate authority represents a region that is validly signed by the root but is other than the one that the validating KMS manages Invalid
  • the certificate is badly formed Revoked
  • the certificate has been revoked (i.e. it was found either on the region's CRL or DNRL) Expired
  • the certificate has expired.
  • the method may first check for certificate expiration. It may next determine whether or not the certificate has been revoked by checking the DNRL and, if necessary, the CRL. It may then validate the certificate against the supplied certificate chain, starting with the certificate at the lowest security tier in the chain.
  • the system may generate a certificate for an entity based on the entity's public key. Included with the public key may be the distinguished name for the certificate, and any other information to be contained in the certificate.
  • a certificate can be generated at one of the specified levels: Root, middle or device.
  • the method may create a certificate with the given information, using the appropriate certificate authority from the provided certificate chain as the issuer.
  • the issuer also determines the security hierarchy level of the generated certificate. It may then request that the authority digitally sign the new certificate with its private key. Once signed, the certificate may be returned to the requesting entity.
  • the system may be able to retrieve a certificate or certificates based on certain criteria, such as the subject's distinguished name, the serial number, the issuer or the expiration date.
  • Search types include:
  • the method may query the KMS certificate store based on the specified search criteria.
  • the system may be able to provide information to report on its condition and operation. It may be able to report statistics on its operation, such as the number of certificates verified, the number of digital signature created, etc.
  • Reports can be generated for a date range and be further specified by optional query parameters such as region.
  • the report can be generated in one of several output formats, such as text, Excel spreadsheet, HTML or RTF.
  • the method may generate the report in the specified format based on the query criteria supplied.
  • the report query criteria may be a simple collection of name-value pairs indicating the type of report being requested and the values to be searched.
  • the system may provide a digital signature for an arbitrary block of data. Given a block of data, a signature algorithm identifier, and an identifier for the signer, the system may create a digital signature for the data block.
  • Access to HSMs for the purpose of signing an artifact may be restricted based on the HSM's role.
  • the root HSM can only be used for signing middle tier (e. g. regional) certificates subject to access by authorized person(s).
  • the issuer identified in the specified certificate may be the signer of the data block.
  • the method may validate the signer's certificate. On successful validation, it may determine, based on the signer, which HSM may be needed to perform the signing operation. It may make the signing request of the HSM and return the resulting signature to the requester.
  • the system may attempt to verify the signature.
  • the issuer identified in the specified certificate may be the signer of the hashed data block.
  • the return value may be true if the data block was in fact signed by the identified signer, false otherwise.
  • the method may obtain the public key from the supplied certificate and decompose the signed data block into the signature and the actual data. It may then create two digests, one by decrypting the signature using the specified algorithm and the other by hashing the data block. After both digests have been created, they may be compared. If they match, the signature is verified.
  • Certificates may be represented as Base64-encoded string elements in the XML stream.
  • a Base64 encoding is used because it can safely encode any arbitrary string of bytes into a textual representation.
  • a certificate collection may simply be an element with certificates as child elements.
  • ⁇ Certificates> ⁇ Root>ab12b311a231fe23ac98ab12b311a231fe23ac98ab ⁇ /Root> ⁇ Reg>12b311a231fe23ac9812b311a231fe23ac9812b311a ⁇ /Reg> ⁇ Dev>b311a231feb311a231feb311a231feb311a231feb311a231feb31 ⁇ /Dev> ⁇ /Certificates>
  • the collection contains certificates of type root, regional and device.
  • the full range of element names for the various certificate types is: Root Root-tier root certificate Reg Middle-tier regional certificate Dev Device-tier device certificate Sess Device-tier session certificate Other Data Streams
  • the Device Keying Manager is implemented as an XTRAN Server for the purposes of executing the business logic necessary to perform the appropriate Key Maintenance on a Devices that has connected from the field.
  • the DKM acts as service on the SECURE COMMUNICATIONS PIPELINE and is only accessible when a Device has anonymously connected to the SECURE COMMUNICATIONS PIPELINE, or connected to SECURE COMMUNICATIONS PIPELINE with specific re-keying certificates, for the purpose of Key Maintenance.
  • the DKM will first identify the type of device needing key maintenance by examining the device certificate “usage” field. The DKM will now determine the type of Key Maintenance that is necessary.
  • the possible Key Maintenance functions that are performed by the DKM are as follows:
  • the DKM uses the services of the KMS XCOMP for validating certificates, signing certificates, getting the latest root and regional certificates, etc.
  • the DKM will request the Device's current certificates. These certificates will be validated to make sure that they originated from the secure gateway architecture 100 and identify the type of device that is connected. Next these certificates will be examined to determine the level of Key Maintenance that is required, which may include one or more of the following:
  • FIG. 7 shows a flow chart that shows the Re-Keying algorithm.
  • FIG. 8 shows a sub-flow diagram showing how a certificate cluster is validated for its authenticity.
  • the device must have the ability to generate an authentication key pair that is temporary. Creating this temporary key pair will not affect the current authentication key pair. This key pair could be thought of as the “next” key pair.
  • transition from current authentication key-pair to “next” authentication key pair can only take place when the device is presented a matching certificate that contains the “next” public key, and can be validated up to the current root certificate that the device contains.
  • the Device Keying Manager interacts with the components as:
  • Adapters 135 are software components that sit between secure communications pipeline and service providers that are required by clients. They exist to translate the messages sent over secure communications pipeline to the format that is required by service provider.
  • An adapter is used for each postal core service.
  • a generic message protocol may be used to reset meter funds, and it is the adapter that translates the protocol into the proper calls to the actual postal core service.
  • the adapter may be responsible for parsing the message delivered by secure communications pipeline, and translating for the actual postal core. Similarly, the adapter may take the specific responses and calls from the postal core and translate them into the protocol before sending them to secure communications pipeline to be delivered to the client.
  • Secure communications pipeline server redundancy provides redundant servers for both the secure communications pipeline server as well as the business server.
  • the secure communications pipeline server may require hardware Security Modules (HSMs) that are used to establish SSL sessions with clients. For this reason, both secure communications pipeline serversSecure communications pipeline servers shall “listen” to one virtual IP address and therefore each shall handle a share of the connections. If one of the secure communications pipeline servers becomes disabled, then one of the remaining server shall take the full connection load.
  • Thesecure communications pipeline servers are not being relied upon for load sharing as each one is capable of handling the full connection load.
  • Each secure communications pipeline server shall have a Primary and Secondary connection to the Business Servers. Normally secure communications pipeline server (SS) # 1 would be connected to Business Server (BS) # 1 and correspondingly SS # 2 would be connected to BS # 2 . If either Business Server becomes unavailable, then the corresponding secure communications pipeline Server would switch its connection to the other Business Server.
  • SS secure communications pipeline server
  • the Business Server houses the business logic, the KMS with its Hardware Security Modules, optional manufacturing services and potentially adapters to infrastructure services. Servers would have HSMs for regional CAs. However, these would not be duplicates (same private keys) but rather unique keys. There may be only one deployed system that would have the Root key. The Root key HSM would be only located on one of the Business Servers.
  • FIG. 10 shows the servers in pairs for the sake of simplicity, if the system ever had to be scaled to increase capacity then another set of servers could be added.
  • the present invention is directed to a secured gateway into a postal service providers infrastructure, such that devices like mailing machines could securely connect into the infrastructure using both authentication as well as encryption. Communication within the infrastructure could be in the clear but is not limited in this way.
  • the burden of authentication and encryption may basically stop and start at the secured gateway.
  • the gateway is referred to herein as the secure communications pipeline.
  • the secure communications pipeline essentially operates using public key methods in order to provide authentication of both the server to the client connecting in as well as to enable the server to authenticate the client. It may be a mutual authentication and may be based upon the standard SSL.
  • the present invention is directed to:
  • a certificate hierarchy is utilized. At the top of the hierarchy there is a root key which is a public/private key pair, and then underneath there is a regional tier such that particular regions of the world would have their own regional key pairs, as the United States, for example, would not have to use the same region information as France would or another installation. Below the region is the actual device that would be connecting in as well as the low level session based communication.
  • All hierarchies may be supported by hardware that is highly secure, typically this is referred to as a hardware security module, which contains the private key internally.
  • a hardware security module which contains the private key internally.
  • the functionality of the HSM may be incorporated into a computing device secure by its inaccessibility.
  • the devices certificates may be subordinate in relationship to one another. At the lowest level there might be the actual mailing machine. Devices at that level would be signed by the associated regional level and the regional level itself would be signed by the root. Thus one can always verify that if a certificate had been signed by, for example, the device.
  • the private key within the device actually signs the information and then packages the certificate to go along with it, the certificate being that piece which has the public information. If one has the certificate for the region one can then verify that indeed the device certificate is valid by examining the root certificate as valid, then one can validate that the regional certificate is valid.
  • server machines 1010 , 1015 , 1020 , 1025 there may be 4 server machines 1010 , 1015 , 1020 , 1025 plus a secure manufacturing server 1030 .
  • the server machines 1010 , 1015 , 1020 , 1025 are split up in this manner mostly for security sake as well as redundancy sake.
  • the horizontal level for example, secure communications pipeline server 1010 and business server 1020 , comprise a functional entity.
  • the reason that they are split apart into servers with a firewall 1035 in between again is for security reasons.
  • the front server 1010 is close to the internet and has a firewall 1040 , it may have a minimum amount of functionality, so that any important business logic or data would be separated on a different server, e.g. 1020 with a firewall 1035 in between.
  • session keys 1045 , 1050 associated with each secure communications pipeline server 1010 , 1015 .
  • the number and configuration of the secure communications pipeline servers and business servers is for example only. Other configurations and numbers of servers may be utilized as appropriate.
  • the secure communications pipeline servers 1010 , 1015 listen to a virtual IP Address, in other words the same address, and in effect, every new connection that comes into the system is doled out to a different secure communications pipeline server. Doling may be done in a round robin fashion. If one server becomes disabled, it may no longer be able to participate and the remaining server or servers may pick up the load.
  • the secure communications pipeline servers 1010 , 1015 are configured to be redundant such that if one fails the other existing servers are available to assume the new connections as they occur.
  • the business servers 1020 , 1025 are set up with a similar redundant configuration for the same reason. Normally, there is a connection between secure communications pipeline server 1010 and business server 1020 , and between secure communications pipeline server 1015 and business server 1025 . Additional secure communications pipeline servers and business servers may also be a part of the hardware deployment embodiment 1000 .
  • the connections may be soft in the sense that each of those secure communications pipeline servers 1010 , 1015 is configured in such a way that they have a primary business server designated as well as other secondary business servers.
  • the business servers 1020 , 1025 are also configured to be redundant such that if one fails the other existing business servers are available to assume new connections from the secure pipeline servers as required.
  • the session keys 1045 on secure communications pipeline server 1010 may be signed by the regional device on business server 1020 .
  • logic may be implemented such that it would be seen that that device 120 is not yet part of the associated region.
  • the associated region is the logical region within a country or locale. Regardless of which secure communications pipeline server 1010 . 1015 a device 120 actually connects into, the logic would be to take that device certificate as well as the manufacturing region certificate within the device 120 to bring them up to the server and ultimately to have the device certificate resigned by the regional device. The resigned device certificate along with the new regional certificate would be sent back to the device. The device 120 may always check the validity of those certificates that came back to it because they can be traced to the root certificate.
  • Another scenario might include a device 120 brought into this logical region and the next time that it connects in, for example, to download funds, it may be connected to a different secure communications pipeline server 1010 , 1015 .
  • this does not present a problem because even though it is not connected to the secure communications pipeline server 1010 , 1015 to which it had connected the first time, nevertheless, it contains the certificates and ships them up to the secure communications pipeline server 1010 , 1015 .
  • the secure communications pipeline server 1010 , 1015 does not need to have prior knowledge of that regional certificate because it simply takes it from the device 120 , takes the device's certificate validates it against that regional certificate that was passed up from the device and that in turn is then validated against the root.
  • Each component may have the capability to validate the chain up to the root.
  • the impact of this is that the regional business servers, 1020 , 1025 even though they are redundant, need not communicate any information to each other. This is advantageous to the management of the system because otherwise there would have to be various forms of database replication.
  • secure communications pipeline server 1015 may normally be connected to business server 1025 . If business server 1025 fails, secure communications pipeline server 1015 will then find another business server that is available, which in the case of the hardware deployment FIG. 10 would be business server 1020 . Business server 1010 never needs to know about the actual regional certificate that was used originally to sign it because it would obtain that regional certificate information from the device 120 itself.
  • the manufacturing server 1030 may also be redundant and configured such that communications from business servers 1020 , 1025 are routed alternately to each server. If one or more manufacturing servers is non functional, communications may be routed to the other manufacturing servers until an operational manufacturing server is found.
  • the device 120 upon initialization during manufacturing shall have its first certificate, that being signed by one of the manufacturing region certificates, provided by any one of the redundant manufacturing servers 1030 .
  • the particular redundant secure communications pipeline server 1010 , 1015 will have its certificate signed by the top-level root certificate, the server's certificate being utilized to sign the devices own internally generated certificate.
  • the device 120 upon introduction into a region, where the region is represented by more than one redundant secure communications pipeline servers 1010 , 1015 will provide its manufacturing certificate to the said one of the redundant region or business servers 1020 , 1025 .
  • the particular region business server will identify said device as authentic by validating that the manufacturing certificate presented is signed by the same root that has signed its own region certificate.
  • the redundant business server proceeds to sign the devices certificate with its region certificate, said certificate being returned to the device 120 . At this point the device is known to the one, of more than one redundant region business servers.
  • the device 120 when the device 120 initiates a future communication session with its region, said device has no indication of which of the more than one redundant region business servers it has connected to. Consequently, for the redundant business server to authenticate the device, said server examines the device certificate chain as presented by the device to the server. Said certificate chain shall contain the device certificate, the regional certificate of the region that signed the device certificate, and the root certificate. If the redundant region business server determines that the devices certificate has a signing chain traceable to their common root certificate, the region redundant business server has authenticated the device. Said mutual authentication allows the communication session to continue.
  • any one of the more than one region redundant servers with which the device has initiated communication may instruct the device to generate a new key pair where said public part of the key pair shall be placed in a certificate and in turn will be signed by the one of more than one region redundant host's regional certificates to which the device is communicating. Said certificate returned to the device, replacing its previous region certificate.

Abstract

A secure gateway includes a TLS server for authenticating connecting devices, a connection manager for routing requests from the TLS server to service provider adapters, and a key management system for providing key management functions, wherein when a device provides a manufacturing certificate to one or more servers of the gateway, servers identify the device as authentic by validating that the manufacturing certificate provided is signed by the same root that has signed the servers its own certificate.

Description

    BACKGROUND
  • The disclosed embodiments relate to a secure gateway to a postal service provider infrastructure that provides postal related services.
  • BRIEF DESCRIPTION OF RELATED DEVELOPMENTS
  • A high volume postal customer may use a meter which incorporates a Postal Security Device (PSD) to secure the proof of payment of postal indicia. In an exemplary application, indicia may be applied to mailing items that identifies the value of the postage applied and other information. A customer may purchase postage and the purchased value may be stored in the PSD. As the postage indicia is applied to items, the value applied may be deducted from the stored value. Once postage indicia is applied, the item may then be dropped into the collection stream of the particular postal system and subsequently processed for delivery. A customer generally purchases postage by having the meter communicate with a postal service infrastructure, either automatically or manually.
  • It would be advantageous to provide a secure communications pipeline to a postal service infrastructure that provides postal related services. It would also be advantageous to provide a postal service infrastructure having a common extensible application protocol and structure that accommodates legacy applications and services as well as future applications and services.
  • SUMMARY OF THE DISCLOSED EMBODIMENTS
  • A secure gateway includes a TLS server for authenticating connecting devices, a connection manager for routing requests from the TLS server to service provider adapters, and a key management system for providing key management functions, wherein when a device provides a manufacturing certificate to one or more servers of the gateway, servers identify the device as authentic by validating that the manufacturing certificate provided is signed by the same root that has signed the servers its own certificate.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The foregoing aspects and other features of the disclosed embodiments are explained in the following description, taken in connection with the accompanying drawings, wherein:
  • FIG. 1 shows an exemplary secure gateway application architecture;
  • FIG. 2 shows a block diagram of a secure communications pipeline component overview;
  • FIG. 3 shows a diagram of a hardware security module manager;
  • FIG. 4 shows an example of system component interaction when a device connects to the secure communications pipeline;
  • FIG. 5 shows a key hierarchy within hardware security modules;
  • FIG. 6 shows a diagram of key management system component interaction;
  • FIG. 7 shows an exemplary re-keying algorithm;
  • FIG. 8 shows a process for key management system cluster validation;
  • FIG. 9 shows component interaction for a device key manager;
  • FIG. 10 shows an exemplary hardware deployment; and
  • FIGS. 11-13 show how device certificates are managed.
  • DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS
  • FIG. 1 shows a block diagram of a secure gateway architecture 100 suitable for practicing the embodiments disclosed herein. Although the exemplary embodiments will be described with reference to the embodiment shown in the drawings, it should be understood that they may be embodied in many alternate forms. In addition, any suitable size, shape or type of elements or materials could be used.
  • The embodiments disclosed herein are directed to the secure gateway architecture 100 which may provide:
    • a secure communications pipeline to serve as the foundation for device and infrastructure communications;
    • a common extensible application communications protocol that may accommodate adaptation of legacy and development of future funds resetting infrastructures and services;
    • flexible client connectivity where client entities which wish to connect to a service provider infrastructure may do so via the Ethernet from a LAN connection or modem via an ISP as well as direct modem connection via a postal service provider infrastructure hosted modem pool;
    • a secure infrastructure that provides for future solutions and insures the bi-directional guarantee that a rogue device cannot be accepted by the service provider infrastructure and a rogue infrastructure cannot be accepted by a real device;
  • an adaptable, extensible architecture and application protocol that allows for connectivity with current as well as future products; and
    • a system that is reliable, scalable, and robust.
  • The secure gateway architecture 100 may be based upon an XML messaging architecture referred to herein as an XBUS.
  • The XBUS may be used as a communication mechanism between the various distributed components that comprise the secure gateway 100.
  • In the secure gateway 100, a manufacturing system 105 could be implemented on its own XBUS network which would provide an easy mechanism for the various manufacturing workstations to communicate with various manufacturing server components. This Manufacturing XBUS could then be bridged using an XBRIDGE to the main secure communications pipeline XBUS to make use of a Key Management System 110 that is on the secure communications pipeline XBUS. The Key Management System (KMS) 110 GENERALLY provides Key Management services in response to request messages that are sent to it.
  • Referring again to FIG. 1, the secure gateway architecture 100 may include the following core components:
  • Secure Communications Pipeline Server 115: The secure communications pipeline server 115 may provide the basic security between a device (meter/base) 120 and the server infrastructure 100. The heart of the secure communications pipeline server 115 may be a TLS server 125 responsible for creating a mutually authenticated secure session between the device 120 and the infrastructure 100. In addition the secure communications pipeline server 115 may provide service routing functionality between the device 120 and its intended service destination adapter via a secure communications pipeline Service Router (SSR) 130. The SSR 130 may provide service routing control between the device 120 and the intended destination.
  • Adapters 135—An adapter 135 for each service provider may be provided that is supported by the secure gateway architecture 100. These adapters 135 may communicate with the secure communications pipeline server 115 on behalf of a specific SSL/TLS device connection. Field devices may communicate with the adapters 135 using an application protocol specific to each adapter. The application messages may be transported between the secure communications pipeline server 115 and the specific adapter 135 in either a raw IP packet or wholly contained in an XBUS Message envelope as appropriate to the adapter implementation (IP/XBUS).
  • Key Management System (KMS) 110—The KMS component 110 may be implemented as an XBUS server to provide all of the necessary Key and Certificate management services needed by the secure gateway system.
  • Keying Manager 140—A Device Keying Manager (DKM) 140 may be responsible for all of the business logic necessary for the re-keying of devices (Meter/Bases) in the field. The DKM 140 acts as any other service or adapter in the secure gateway system 100.
  • Event Logger (EL) 145—An EL component 145 may be used to log events that occur throughout the secure gateway system 100. It is responsible for storing event information into a common repository and can also be queried to produce a filtered list of events that match a specified criterion.
  • Admin GUI (AGUI) 150—The AGUI component 150 may provide a user interface that is used to configure and maintain the secure gateway system.
  • Manufacturing Interface (MI) 155—The MI component 155 may be used by the manufacturing infrastructure 105 to communicate with services offered by on the secure gateway network. This interface may be primarily used by the manufacturing infrastructure 105 to access the Key Management services offered by the KMS 110.
  • The secure gateway system 100 is able to provide a highly secure gateway to various infrastructure services/adapters using a three tier certificate hierarchy (Root, Region, Device) provided by the KMS component. Using this highly secure gateway, it is possible to route any application protocol from a field device to an infrastructure service.
  • Secure Communications Pipeline Server Componentization
  • Turning to FIG. 2, the secure communications pipeline server 115 may be responsible for creation of a secure channel between the connecting device 120 and the secure gateway infrastructure 100 using a mutually authenticated TLS session and secure routing of service requests from TLS sessions to service adapters 135.
  • This combination of capabilities provides a bi-directional secure pipeline between the connecting device 120 and the secure gateway Services Tier. The device and server can assume the role of client, server or both, at different times. Asynchronous communication can occur in either direction.
  • TLS Server 125
  • The TLS server 125 may be used to accept secure connections from outside devices to the secure communications pipeline. This socket server may internally use a bank of Hardware Security Module's (HSM) 205 for the purpose of authentication in the TLS protocol negotiation process.
  • When a secure connection is accepted by the TLS server 125, the server sends a notification of a new connection to the secure communications pipeline Connection Manager(SCM) 210.
  • Secure Communications Pipeline Connection Manager (SCM) 210
  • The SCM 210 is responsible for routing service requests to service provider adapters 135 based on certain criteria. If all criteria are valid the connection proceeds to the secure communications pipeline Service Router 130, the SCM 210 may use an instance of the Service Routing Component 215 to complete the service route.
  • Secure Communications Pipeline Service Router (SSR) 130
  • The SSR 130 may include of a collection of service router objects that implement a common interface IServiceRouter, and a class factory to create them, including there are two types of Service Route objects, IP based router and XBus router.
  • The IP Based Router 215 routes connection to an IP Socket based service provider 135 a.
  • The XBUS Based Router 220 routes connections to an XBUS service provider 135 b.
  • The SSR 130 uses a service list to determine the type of service router for the class factory to instantiate. Once this is accomplished an internal session manager associates the session with the IServiceRouter objects, and transports all data between the session and the service through the IServiceRouter object.
  • Service Router Interface (IServiceRouter)
  • The IServiceRouter interface implemented by Service Routers may include of the following methods:
    CONNECT New connection occurred
    DISCONNECT Existing connection terminated
    INBOUND_MSG Message sent from device to service
    provider
    OUTBOUND_MSG Message sent from service provider to
    device.

    Hardware Security Module Manager 225
  • The HSM Manager component 225 is responsible for maintaining a dynamic list of all HSM devices 205 that are currently available. As HSM devices 205 become available or as they are taken off line the HSM manager 225 may dynamically monitor the total number of HSM devices available. This component may also provide a set of messages or an interface to communicate the status of each HSM 205 to other system devices. For example, the interface would expose such messages as “GetHSMSummary”, ReKeyHSM” and “HSMEvents”.
  • Each HSM 205 is associated with one public/private key pair, that functions in a particular role. There may be multiple HSMs 205 for a particular role on the same machine. For example, the machine that hosts the secure communications pipeline server may contain multiples HSMs 205, with some set of the total HSMs on that machine dedicated to the secure communications pipeline server for use in establishing SSL/TLS session.
  • The HSM Manager component 225 may transport the various messages, to and from devices.
  • Secure Communications Pipeline Connection Component Interaction
  • FIG. 4 illustrates exemplary component interaction when a device connects in to secure communications pipeline.
  • The secure communications pipeline server 115 is also responsible for re-keying devices in the field which may be required in the following scenarios:
  • The first secure communications pipeline Server connection after the device is manufactured. The device must be moved from the Manufacturing Security Region to the appropriate Security Region based on the customer. (Typically Country Specific)
  • The device's certificates are invalid, due to either a Root Key change, or a Region change.
  • The device's key pair is deemed to expire within a configurable period of time.
  • In all of these situations the devices certificates must be updated to the current Root, and Region, and potentially a new device key-pair must be generated. The management of these keys and certificates is the responsibility of the Key Management System 110. The secure communications pipeline server 115 is responsible for updating these credentials before a secure session can be created. This device re-keying may take place when the device connects to the secure communications pipeline server initially.
  • Certificate Verification—This may allow the caller the ability to authenticate a certificate. This may return a response that may indicate if the certificate is verified or, if not, it may indicate why it was not verified.
  • Certificate Generation—This may allow the caller to create a certificate using a specified public key (as well as some other identifying information). This newly created certificate may be signed by a specified certification authority before being returned to the caller.
  • Certificate Retrieval—This may be used to retrieve a specified certificate from the certificate store inside the KMS system.
  • Digital Signature—This may return a digital signature using a specified regional certificate, an arbitrary block of data to sign as well as various parameter to specify the details of how the signing is to be accomplished.
  • Signature Verification—Given a block of data and a signature, this method may be able to verify that the signature is correct.
  • Retrieve Root Certificate Chain—Retrieves the chain of root certificates up to a specified date or root certificate in the chain.
  • Certificate Revocation—Provides a way to revoke a certificate based on its serial number or distinguished name.
  • 3-tier Hierarchy
  • In order to provide key usage isolation according to function, three tiers of key trust shall be utilized.
  • At the top of the trust hierarchy, or level one, is the Root Key. The Root key is the umbrella signatory for the rest of the hierarchy.
  • Level two shall have the Manufacturing, Active Regions and Special Function keys. The Manufacturing key is the key under which devices shall be manufactured. Active Regions are the keys which shall provide the “active” trust when deployed in a particular country or region. The Special Function keys are for the purpose of signing software, rate tables, etc.
  • Level three shall consist of Client keys which would be at the customer (e.g. device key). Level three would also contain session establishment keys used to establish an active connection with a client.
  • FIG. 5 illustrates the hierarchy.
  • Since the private keys within the hierarchy need to be truly private, Hardware Security Modules (HSM) may be utilized to store them. In this manner, when the HSM creates the Private/Public key pair it may only divulge its Public key and the Private key shall never be divulged. There may be multiple HSMs for a single role. For example, the secure communications pipeline server may use multiple HSM for SSL sessions, and the KMS may use multiple HSMs for a region. Alternately, the functionality of the HSM may be incorporated into a computing device secure by its inaccessibility.
  • Root Chaining
  • All keys have a finite cryptographic lifetime at the end of which the keys need to be regenerated. Also, there is the theoretical possibility that some of the keys could become compromised. Since the Root key is at the top of the trust hierarchy, a mechanism is established by which its update can be trusted. This shall be accomplished through “Root chaining”. Root chaining is the technique by which the current Root certificate has information about the next (child) Root. This is accomplished by inserting the hash of the next Root certificate into the Current Root certificate. In this manner when the Root is updated, the clients in the field can verify that the new Root is legitimate based upon the hash that was stored in the old Root certificate.
  • FIG. 6 illustrates the key management system component interaction
  • The KMS 110 may interact directly with many of the secure gateway components. The following is a description of those interactions:
  • Secure Communications Pipeline 115—The secure communications pipeline 115 uses the services of the KMS 110 in order to manage the HSM (Hardware Security Modules) 205 used to establish the secure connections.
  • Device Keying Manager (DKM) 140—The DKM 140 uses the KMS services to perform Device Key Maintenance.
  • XBUS Service Manager (XSM) 610—The XSM 610 is responsible for launching and monitoring the KMS component 110.
  • Event Logger (EL) 145—The KMS 110 uses the EL 145 to log events that are associated with Key Management. These events would include when a certificate is revoked, when a root or region is re-keyed, etc.
  • Key Management System Interface
  • Services may be provided to any client that can connect to the KMS. Protected services may be available only on the machine that hosts the KMS.
  • An exception may be identified if a system failure prevents one of the following operations from completing or invalid input was provided (e.g. an XBus failure, network failure, server failure, server error, out of memory, empty or invalid certificate chain, etc.)
  • Certificate Verification
  • The system may authenticate an entity based on a certificate (device, software, KMS server, client application, others as appropriate) and associated certificate chain. It may report back results of verification, with responses such as Verified, Verified Not Current, Verified Region Not Current, Verified Root Not Current, Not Verified, Valid Manufacturing Region, Valid Unknown Region, Invalid, Revoked. If the regional certificate authority is not one that is managed by this KMS instance, the system may check if the unknown regional certificate is correctly signed by the current root.
  • The system may also check that the certificate has not expired, and that it is not contained on the Certificate Revocation List (CRL) or the Distinguished Name Revocation List (DNRL).
  • The system may return a value to indicate if the certificate was verified, and if not, the reason for non-verification.
  • Authentication may be based on the number of certificates in the chain.
    CertificateStatus Meaning
    Verified The certificate is valid and
    the entire certificate chain
    is valid and up-to-date
    Verified Region The certificate is valid with
    Not Current respect to the certificate
    chain, but a newer middle-tier
    certificate is available.
    Verified Root Not The certificate is valid with
    Current respect to the certificate
    chain, but a newer root
    certificate is available.
    Not Verified The certificate or one or more
    of the certificates in the
    chain could not be verified.
    Valid The certificate and
    Manufacturing certificate chain are valid
    Region and up-to-date, and the
    middle-tier certificate
    authority is the special
    manufacturing region
    Valid Unknown The certificate and
    Region certificate chain are valid
    and up-to-date. The middle-
    tier certificate authority
    represents a region that is
    validly signed by the root but
    is other than the one that the
    validating KMS manages
    Invalid The certificate is badly
    formed
    Revoked The certificate has been
    revoked (i.e. it was found
    either on the region's CRL or
    DNRL)
    Expired The certificate has expired.
  • The method may first check for certificate expiration. It may next determine whether or not the certificate has been revoked by checking the DNRL and, if necessary, the CRL. It may then validate the certificate against the supplied certificate chain, starting with the certificate at the lowest security tier in the chain.
  • Certificate Generation
  • The system may generate a certificate for an entity based on the entity's public key. Included with the public key may be the distinguished name for the certificate, and any other information to be contained in the certificate.
  • A certificate can be generated at one of the specified levels: Root, middle or device.
  • The method may create a certificate with the given information, using the appropriate certificate authority from the provided certificate chain as the issuer. The issuer also determines the security hierarchy level of the generated certificate. It may then request that the authority digitally sign the new certificate with its private key. Once signed, the certificate may be returned to the requesting entity.
  • Certificate Retrieval
  • The system may be able to retrieve a certificate or certificates based on certain criteria, such as the subject's distinguished name, the serial number, the issuer or the expiration date.
  • Search types include:
      • Subject distinguished name
      • Certificate serial number
      • Certificate issuer
      • Certificate expiration date
      • Revocation status
      • Security hierarchy level
  • The method may query the KMS certificate store based on the specified search criteria.
  • Report Information
  • The system may be able to provide information to report on its condition and operation. It may be able to report statistics on its operation, such as the number of certificates verified, the number of digital signature created, etc.
  • Reports can be generated for a date range and be further specified by optional query parameters such as region. The report can be generated in one of several output formats, such as text, Excel spreadsheet, HTML or RTF.
  • The method may generate the report in the specified format based on the query criteria supplied. The report query criteria may be a simple collection of name-value pairs indicating the type of report being requested and the values to be searched.
  • Digital Signature
  • The system may provide a digital signature for an arbitrary block of data. Given a block of data, a signature algorithm identifier, and an identifier for the signer, the system may create a digital signature for the data block.
  • Access to HSMs for the purpose of signing an artifact (e.g. software, a certificate, etc.) may be restricted based on the HSM's role. For example, the root HSM can only be used for signing middle tier (e. g. regional) certificates subject to access by authorized person(s).
  • The issuer identified in the specified certificate may be the signer of the data block.
  • The method may validate the signer's certificate. On successful validation, it may determine, based on the signer, which HSM may be needed to perform the signing operation. It may make the signing request of the HSM and return the resulting signature to the requester.
  • Signature Verification
  • Given a block of data, a signature, an identifier for the signer and a signature algorithm identifier, the system may attempt to verify the signature.
  • The issuer identified in the specified certificate may be the signer of the hashed data block.
  • The return value may be true if the data block was in fact signed by the identified signer, false otherwise.
  • The method may obtain the public key from the supplied certificate and decompose the signed data block into the signature and the actual data. It may then create two digests, one by decrypting the signature using the specified algorithm and the other by hashing the data block. After both digests have been created, they may be compared. If they match, the signature is verified.
  • Certificates and Certificate Collections
  • Certificates may be represented as Base64-encoded string elements in the XML stream. A Base64 encoding is used because it can safely encode any arbitrary string of bytes into a textual representation. A certificate collection may simply be an element with certificates as child elements.
    <Certificates>
    <Root>ab12b311a231fe23ac98ab12b311a231fe23ac98ab</Root>
    <Reg>12b311a231fe23ac9812b311a231fe23ac9812b311a</Reg>
    <Dev>b311a231feb311a231feb311a231feb311a231feb31</Dev>
    </Certificates>
  • As shown, the collection contains certificates of type root, regional and device. The full range of element names for the various certificate types is:
    Root Root-tier root
    certificate
    Reg Middle-tier regional
    certificate
    Dev Device-tier device
    certificate
    Sess Device-tier session
    certificate

    Other Data Streams
  • Several interface functions call for data blocks and signatures. These may also be represented as Base64-encoded strings, as follows:
    <Block>12b311a231fe23ac9812b3231feb
    11a231fe23ac9812b311a</Block>
    <Sig>b311a231feb311a231fe
    311a231feb311a231feb311a231feb31</Sig>

    Device Keying Manager (DKM)
  • The Device Keying Manager (DKM) is implemented as an XTRAN Server for the purposes of executing the business logic necessary to perform the appropriate Key Maintenance on a Devices that has connected from the field. The DKM acts as service on the SECURE COMMUNICATIONS PIPELINE and is only accessible when a Device has anonymously connected to the SECURE COMMUNICATIONS PIPELINE, or connected to SECURE COMMUNICATIONS PIPELINE with specific re-keying certificates, for the purpose of Key Maintenance. Once the device establishes a session with the DKM, the DKM will first identify the type of device needing key maintenance by examining the device certificate “usage” field. The DKM will now determine the type of Key Maintenance that is necessary. The possible Key Maintenance functions that are performed by the DKM are as follows:
      • Resigning a Device's certificates
      • Updating a Device's Root and Regional certificates
      • Re-keying a Device
  • The DKM uses the services of the KMS XCOMP for validating certificates, signing certificates, getting the latest root and regional certificates, etc.
  • Re-Keying
  • When a Device is unable to connect to the SECURE COMMUNICATIONS PIPELINE using Two-Way authentication, it will know that it must perform some level of Key Maintenance. At this point the Device will attempt to connect to the SECURE COMMUNICATIONS PIPELINE using an anonymous SSL/TLS connection. By default, the only “Class” of service that a Device can connect under an anonymous connection is the DKM.
  • Once connected, the DKM will request the Device's current certificates. These certificates will be validated to make sure that they originated from the secure gateway architecture 100 and identify the type of device that is connected. Next these certificates will be examined to determine the level of Key Maintenance that is required, which may include one or more of the following:
      • The Root certificate needs to be updated
      • The Regional Certificate needs to be updated
      • The Device's certificate has expired and needs to be Re-Keyed
      • The Device's certificate needs to be resigned by the current Regional certificate
  • FIG. 7 shows a flow chart that shows the Re-Keying algorithm.
  • FIG. 8 shows a sub-flow diagram showing how a certificate cluster is validated for its authenticity.
  • Re-Keying Device Implications
  • The re-keying algorithm will have the following implications on the device:
  • The device must have the ability to generate an authentication key pair that is temporary. Creating this temporary key pair will not affect the current authentication key pair. This key pair could be thought of as the “next” key pair.
  • The transition from current authentication key-pair to “next” authentication key pair can only take place when the device is presented a matching certificate that contains the “next” public key, and can be validated up to the current root certificate that the device contains.
  • The Device Keying Manager (DKM) interacts with the components as:
    • SECURE COMMUNICATIONS PIPELINE—When a device connects for key maintenance, the SECURE COMMUNICATIONS PIPELINE routes those devices to the PKM. During the key maintenance process, the PKM communicates with the device via the SECURE COMMUNICATIONS PIPELINE.
    • Event Logger (EL)—As the PKM performs the necessary key maintenance operations on the device, it will log messages to the EL to indicate what actions were performed.
    • Key Management System (KMS)—The PKM interacts directly with the KMS component for all of the key maintenance services (i.e. getting certificates, validating certificates, signing certificates, etc) necessary for updating and re-keying the device.
    • XBUS Service Manager (XSM)—The XSM is responsible for launching and monitoring the PKM.
      Adapters 135
  • Adapters 135 are software components that sit between secure communications pipeline and service providers that are required by clients. They exist to translate the messages sent over secure communications pipeline to the format that is required by service provider.
  • An adapter is used for each postal core service. A generic message protocol may be used to reset meter funds, and it is the adapter that translates the protocol into the proper calls to the actual postal core service. In this case the adapter may be responsible for parsing the message delivered by secure communications pipeline, and translating for the actual postal core. Similarly, the adapter may take the specific responses and calls from the postal core and translate them into the protocol before sending them to secure communications pipeline to be delivered to the client.
  • There may be situations where an adapter may not be needed between secure communications pipeline and the service provider. Such a situation would exist where secure communications pipeline is channeling messages to a web service.
  • Secure Communications Pipeline Server Redundancy
  • Secure communications pipeline server redundancy provides redundant servers for both the secure communications pipeline server as well as the business server. The secure communications pipeline server may require hardware Security Modules (HSMs) that are used to establish SSL sessions with clients. For this reason, both secure communications pipeline serversSecure communications pipeline servers shall “listen” to one virtual IP address and therefore each shall handle a share of the connections. If one of the secure communications pipeline servers becomes disabled, then one of the remaining server shall take the full connection load. Thesecure communications pipeline servers are not being relied upon for load sharing as each one is capable of handling the full connection load.
  • Each secure communications pipeline server shall have a Primary and Secondary connection to the Business Servers. Normally secure communications pipeline server (SS) #1 would be connected to Business Server (BS) #1 and correspondingly SS # 2 would be connected to BS # 2. If either Business Server becomes unavailable, then the corresponding secure communications pipeline Server would switch its connection to the other Business Server.
  • Business Server Redundancy
  • The Business Server houses the business logic, the KMS with its Hardware Security Modules, optional manufacturing services and potentially adapters to infrastructure services. Servers would have HSMs for regional CAs. However, these would not be duplicates (same private keys) but rather unique keys. There may be only one deployed system that would have the Root key. The Root key HSM would be only located on one of the Business Servers.
  • Scaling
  • While FIG. 10 shows the servers in pairs for the sake of simplicity, if the system ever had to be scaled to increase capacity then another set of servers could be added.
  • The present invention is directed to a secured gateway into a postal service providers infrastructure, such that devices like mailing machines could securely connect into the infrastructure using both authentication as well as encryption. Communication within the infrastructure could be in the clear but is not limited in this way. The burden of authentication and encryption may basically stop and start at the secured gateway. The gateway is referred to herein as the secure communications pipeline. The secure communications pipeline essentially operates using public key methods in order to provide authentication of both the server to the client connecting in as well as to enable the server to authenticate the client. It may be a mutual authentication and may be based upon the standard SSL. The present invention is directed to:
    • providing a system that is redundant, meaning that if portions of it failed that it would continue to run;
    • that is scaleable such that when the demand for having more machines connected into the infrastructure increases, the server can still keep up with the increased number of connections; and
    • providing disaster recovery capabilities and functions that could take over in the event that the primary hosting site that is hosting this server would become severely incapacitated as due to a fire or some other calamity.
  • In cases where the service postal provider operations would have to be moved physically to some other site, there may be equipment set up already at another physical location and some means of manual switch over is typically necessary and also considered acceptable. In the case of the primary site, there may be a requirement to have the system available 99.9% of the time. The present invention provides this by providing sufficient redundancy in case there is some sort of a failure either due to a hardware problem or even perhaps a software glitch.
  • As part of the authentication process, a certificate hierarchy is utilized. At the top of the hierarchy there is a root key which is a public/private key pair, and then underneath there is a regional tier such that particular regions of the world would have their own regional key pairs, as the United States, for example, would not have to use the same region information as France would or another installation. Below the region is the actual device that would be connecting in as well as the low level session based communication.
  • All hierarchies may be supported by hardware that is highly secure, typically this is referred to as a hardware security module, which contains the private key internally. Alternately, the functionality of the HSM may be incorporated into a computing device secure by its inaccessibility.
  • The devices certificates may be subordinate in relationship to one another. At the lowest level there might be the actual mailing machine. Devices at that level would be signed by the associated regional level and the regional level itself would be signed by the root. Thus one can always verify that if a certificate had been signed by, for example, the device. When the initial session is being set up and there is information being transferred from the device to the server, the private key within the device actually signs the information and then packages the certificate to go along with it, the certificate being that piece which has the public information. If one has the certificate for the region one can then verify that indeed the device certificate is valid by examining the root certificate as valid, then one can validate that the regional certificate is valid. Hence, there is a certificate hierarchy by which all certificates can be validated up through the root.
  • When devices destined for the field are initialized in the factory they undergo an initialization or a manufacturing process. From a cryptographic standpoint the device is requested to generate a public private key pair. That public key is then put into an X509 certificate and that X509 certificate is signed by the manufacturing region. There is a segregated region called the manufacturing region. The manufacturing region certificate is in turn signed by the root.
  • Referring to FIG. 10, in one hardware deployment embodiment 1000 there may be 4 server machines 1010, 1015, 1020, 1025 plus a secure manufacturing server 1030. The server machines 1010, 1015, 1020, 1025 are split up in this manner mostly for security sake as well as redundancy sake. The horizontal level, for example, secure communications pipeline server 1010 and business server 1020, comprise a functional entity. The reason that they are split apart into servers with a firewall 1035 in between again is for security reasons. The front server 1010 is close to the internet and has a firewall 1040, it may have a minimum amount of functionality, so that any important business logic or data would be separated on a different server, e.g. 1020 with a firewall 1035 in between.
  • There are session keys 1045, 1050 associated with each secure communications pipeline server 1010, 1015. The number and configuration of the secure communications pipeline servers and business servers is for example only. Other configurations and numbers of servers may be utilized as appropriate. The secure communications pipeline servers 1010, 1015 listen to a virtual IP Address, in other words the same address, and in effect, every new connection that comes into the system is doled out to a different secure communications pipeline server. Doling may be done in a round robin fashion. If one server becomes disabled, it may no longer be able to participate and the remaining server or servers may pick up the load. Thus, the secure communications pipeline servers 1010, 1015 are configured to be redundant such that if one fails the other existing servers are available to assume the new connections as they occur.
  • The business servers 1020, 1025 are set up with a similar redundant configuration for the same reason. Normally, there is a connection between secure communications pipeline server 1010 and business server 1020, and between secure communications pipeline server 1015 and business server 1025. Additional secure communications pipeline servers and business servers may also be a part of the hardware deployment embodiment 1000. The connections may be soft in the sense that each of those secure communications pipeline servers 1010, 1015 is configured in such a way that they have a primary business server designated as well as other secondary business servers. When a particular secure communications pipeline server is started it may generally examine its configuration and the primary business server and try to connect to it. If it cannot, it tries the alternate business servers until it finds one that is functional. Thus, the business servers 1020, 1025 are also configured to be redundant such that if one fails the other existing business servers are available to assume new connections from the secure pipeline servers as required.
  • Because there are associated hardware keys, both for the session set up 1045, 1050 as well as the regions 1055, 1060, managing the information requires innovative solutions. Previous systems did not have provisions for having this level of redundancy within a site. The present invention provides a direct improvement with redundancy provided locally. Previously there was one region for a device 120 (FIG. 1) and if a system failed and for example had to be rebuilt, that device 120 would physically have to be moved in order to be then utilized. In the present embodiments there may be a logical region with the possibility of multiple physical representations through multiple physical hardware devices, each of which actually would have a unique private public key pair always signed by the root. Thus, the session keys 1045 on secure communications pipeline server 1010 may be signed by the regional device on business server 1020.
  • If this hierarchy is preserved the same would correspond on business server 1025 and secure communications pipeline server 1015 in the sense that the session keys on secure communications pipeline server 1015 would be signed by the regional device on business server 1025. The information regarding these signatures also relates to the actual devices 120 that are at the customer's site 160 (FIG. 1). When they are first manufactured, their certificates are signed by the manufacturing region. When a device 120 first connects, for example after having been purchased by a customer and the first time that the customer tries to call for example to obtain funds, the connection could be made into one of the secure communications pipeline servers 1010, 1015 and it may be quite unpredictable as to which one.
  • Nevertheless, logic may be implemented such that it would be seen that that device 120 is not yet part of the associated region. The associated region is the logical region within a country or locale. Regardless of which secure communications pipeline server 1010. 1015 a device 120 actually connects into, the logic would be to take that device certificate as well as the manufacturing region certificate within the device 120 to bring them up to the server and ultimately to have the device certificate resigned by the regional device. The resigned device certificate along with the new regional certificate would be sent back to the device. The device 120 may always check the validity of those certificates that came back to it because they can be traced to the root certificate.
  • Another scenario might include a device 120 brought into this logical region and the next time that it connects in, for example, to download funds, it may be connected to a different secure communications pipeline server 1010, 1015. In this case, this does not present a problem because even though it is not connected to the secure communications pipeline server 1010, 1015 to which it had connected the first time, nevertheless, it contains the certificates and ships them up to the secure communications pipeline server 1010, 1015. The secure communications pipeline server 1010, 1015 does not need to have prior knowledge of that regional certificate because it simply takes it from the device 120, takes the device's certificate validates it against that regional certificate that was passed up from the device and that in turn is then validated against the root. Each component may have the capability to validate the chain up to the root. The impact of this is that the regional business servers, 1020, 1025 even though they are redundant, need not communicate any information to each other. This is advantageous to the management of the system because otherwise there would have to be various forms of database replication. In another embodiment, secure communications pipeline server 1015, may normally be connected to business server 1025. If business server 1025 fails, secure communications pipeline server 1015 will then find another business server that is available, which in the case of the hardware deployment FIG. 10 would be business server 1020. Business server 1010 never needs to know about the actual regional certificate that was used originally to sign it because it would obtain that regional certificate information from the device 120 itself.
  • The manufacturing server 1030 may also be redundant and configured such that communications from business servers 1020, 1025 are routed alternately to each server. If one or more manufacturing servers is non functional, communications may be routed to the other manufacturing servers until an operational manufacturing server is found. The device 120, upon initialization during manufacturing shall have its first certificate, that being signed by one of the manufacturing region certificates, provided by any one of the redundant manufacturing servers 1030. The particular redundant secure communications pipeline server 1010, 1015 will have its certificate signed by the top-level root certificate, the server's certificate being utilized to sign the devices own internally generated certificate.
  • Referring to FIGS. 11, 12 & 13, the device 120 upon introduction into a region, where the region is represented by more than one redundant secure communications pipeline servers 1010, 1015 will provide its manufacturing certificate to the said one of the redundant region or business servers 1020, 1025. The particular region business server will identify said device as authentic by validating that the manufacturing certificate presented is signed by the same root that has signed its own region certificate. Thereupon, the redundant business server proceeds to sign the devices certificate with its region certificate, said certificate being returned to the device 120. At this point the device is known to the one, of more than one redundant region business servers.
  • Referring again to FIGS. 11, 12 & 13, when the device 120 initiates a future communication session with its region, said device has no indication of which of the more than one redundant region business servers it has connected to. Consequently, for the redundant business server to authenticate the device, said server examines the device certificate chain as presented by the device to the server. Said certificate chain shall contain the device certificate, the regional certificate of the region that signed the device certificate, and the root certificate. If the redundant region business server determines that the devices certificate has a signing chain traceable to their common root certificate, the region redundant business server has authenticated the device. Said mutual authentication allows the communication session to continue.
  • Should a device key-pair change be necessary, when a device attempts to establish a session with its region, any one of the more than one region redundant servers with which the device has initiated communication may instruct the device to generate a new key pair where said public part of the key pair shall be placed in a certificate and in turn will be signed by the one of more than one region redundant host's regional certificates to which the device is communicating. Said certificate returned to the device, replacing its previous region certificate.
  • It should be understood that the foregoing description is only illustrative of the invention. Various alternatives and modifications can be devised by those skilled in the art without departing from the invention. Accordingly, the present invention is intended to embrace all such alternatives, modifications and variances which fall within the scope of the appended claims.

Claims (1)

1. A secure gateway comprising:
a TLS server for authenticating connecting devices;
a connection manager for routing requests from the TLS server to service provider adapters; and
a key management system for providing key management functions,
wherein when a device provides a manufacturing certificate to one or more servers of the gateway, servers identify the device as authentic by validating that the manufacturing certificate provided is signed by the same root that has signed the servers its own certificate.
US11/242,964 2005-10-04 2005-10-04 Secure gateway with redundent servers Expired - Fee Related US8046579B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US11/242,964 US8046579B2 (en) 2005-10-04 2005-10-04 Secure gateway with redundent servers
EP06815688A EP1941648A4 (en) 2005-10-04 2006-09-29 Secure gateway with redundant servers
PCT/US2006/037861 WO2007044239A2 (en) 2005-10-04 2006-09-29 Secure gateway with redundant servers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/242,964 US8046579B2 (en) 2005-10-04 2005-10-04 Secure gateway with redundent servers

Publications (2)

Publication Number Publication Date
US20070079115A1 true US20070079115A1 (en) 2007-04-05
US8046579B2 US8046579B2 (en) 2011-10-25

Family

ID=37903234

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/242,964 Expired - Fee Related US8046579B2 (en) 2005-10-04 2005-10-04 Secure gateway with redundent servers

Country Status (3)

Country Link
US (1) US8046579B2 (en)
EP (1) EP1941648A4 (en)
WO (1) WO2007044239A2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150135299A1 (en) * 2012-05-21 2015-05-14 Zte Corporation Method and system for establishing ipsec tunnel
WO2015195751A1 (en) * 2014-06-19 2015-12-23 Microsoft Technology Licensing, Llc Securing communications with enhanced media platforms
US9603019B1 (en) 2014-03-28 2017-03-21 Confia Systems, Inc. Secure and anonymized authentication
US9602292B2 (en) * 2015-07-25 2017-03-21 Confia Systems, Inc. Device-level authentication with unique device identifiers
US10341118B2 (en) * 2016-08-01 2019-07-02 A10 Networks, Inc. SSL gateway with integrated hardware security module
US10484359B2 (en) 2015-07-25 2019-11-19 Confia Systems, Inc. Device-level authentication with unique device identifiers
CN113347148A (en) * 2021-04-20 2021-09-03 北京信安世纪科技股份有限公司 Electronic authentication method and system
US20220166636A1 (en) * 2019-03-14 2022-05-26 Omron Corporation Control device and control system
US11855965B1 (en) * 2019-07-30 2023-12-26 Cyber Ip Holdings, Llc Traceless access to remote deployed devices in undisclosed locations

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4712325B2 (en) * 2003-09-12 2011-06-29 株式会社リコー COMMUNICATION DEVICE, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND PROGRAM
US7949788B2 (en) * 2007-05-18 2011-05-24 The Pnc Financial Services Group, Inc. Apparatus, systems and methods for transformation services
US8782434B1 (en) 2010-07-15 2014-07-15 The Research Foundation For The State University Of New York System and method for validating program execution at run-time
KR20120057734A (en) * 2010-11-22 2012-06-07 삼성전자주식회사 Server, device accessing server and control method
US9026805B2 (en) 2010-12-30 2015-05-05 Microsoft Technology Licensing, Llc Key management using trusted platform modules
US8719571B2 (en) 2011-08-25 2014-05-06 Netapp, Inc. Systems and methods for providing secure multicast intra-cluster communication
US8844015B2 (en) * 2012-01-31 2014-09-23 Hewlett-Packard Development Company, L.P. Application-access authentication agent
US9008316B2 (en) 2012-03-29 2015-04-14 Microsoft Technology Licensing, Llc Role-based distributed key management
US9122873B2 (en) 2012-09-14 2015-09-01 The Research Foundation For The State University Of New York Continuous run-time validation of program execution: a practical approach
US9219747B2 (en) 2013-10-28 2015-12-22 At&T Intellectual Property I, L.P. Filtering network traffic using protected filtering mechanisms

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6233565B1 (en) * 1998-02-13 2001-05-15 Saranac Software, Inc. Methods and apparatus for internet based financial transactions with evidence of payment
US20020038420A1 (en) * 2000-04-13 2002-03-28 Collins Timothy S. Method for efficient public key based certification for mobile and desktop environments
US20020147905A1 (en) * 2001-04-05 2002-10-10 Sun Microsystems, Inc. System and method for shortening certificate chains
US20030110376A1 (en) * 1997-10-14 2003-06-12 Michael J. Wiener Method and system for providing updated encryption key pairs and digital signature key pairs in a public key system
US20030163687A1 (en) * 2002-02-28 2003-08-28 International Business Machines Corporation Method and system for key certification
US20040148505A1 (en) * 2002-11-08 2004-07-29 General Instrument Corporation Certificate renewal in a certificate authority infrastructure
US20050165703A1 (en) * 2004-01-23 2005-07-28 Pitney Bowes Incorporated Method and system for remote feature enabling and disabling in a mailing system
US20060015500A1 (en) * 2004-07-13 2006-01-19 Pitney Bowes Incorporated System and method for securing database records from tampering and managing and recovering from component failure in devices such as postage value dispensing systems
US20060064590A1 (en) * 2004-09-17 2006-03-23 Gerrit Bleumer Method, processing devices and system for exchanging cryptography data
US20060085633A1 (en) * 2004-10-14 2006-04-20 Dirk Balfanz Using a portable security token to facilitate cross-certification between ceritification authorities
US7433847B2 (en) * 2004-09-22 2008-10-07 Pitney Bowes Inc. System and method for manufacturing and securing transport of postage printing devices
US7461250B1 (en) * 1999-07-22 2008-12-02 Rsa Security, Inc. System and method for certificate exchange
US7496200B2 (en) * 2001-11-13 2009-02-24 Microsoft Corporation Architecture for manufacturing authenticatable gaming systems

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7216110B1 (en) 1999-10-18 2007-05-08 Stamps.Com Cryptographic module for secure processing of value-bearing items
US7376835B2 (en) 2000-04-25 2008-05-20 Secure Data In Motion, Inc. Implementing nonrepudiation and audit using authentication assertions and key servers
JP4304362B2 (en) 2002-06-25 2009-07-29 日本電気株式会社 PKI-compliant certificate confirmation processing method and apparatus, and PKI-compliant certificate confirmation processing program
JP4504099B2 (en) * 2003-06-25 2010-07-14 株式会社リコー Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030110376A1 (en) * 1997-10-14 2003-06-12 Michael J. Wiener Method and system for providing updated encryption key pairs and digital signature key pairs in a public key system
US6233565B1 (en) * 1998-02-13 2001-05-15 Saranac Software, Inc. Methods and apparatus for internet based financial transactions with evidence of payment
US7461250B1 (en) * 1999-07-22 2008-12-02 Rsa Security, Inc. System and method for certificate exchange
US20020038420A1 (en) * 2000-04-13 2002-03-28 Collins Timothy S. Method for efficient public key based certification for mobile and desktop environments
US20020147905A1 (en) * 2001-04-05 2002-10-10 Sun Microsystems, Inc. System and method for shortening certificate chains
US7496200B2 (en) * 2001-11-13 2009-02-24 Microsoft Corporation Architecture for manufacturing authenticatable gaming systems
US20030163687A1 (en) * 2002-02-28 2003-08-28 International Business Machines Corporation Method and system for key certification
US20040148505A1 (en) * 2002-11-08 2004-07-29 General Instrument Corporation Certificate renewal in a certificate authority infrastructure
US20050165703A1 (en) * 2004-01-23 2005-07-28 Pitney Bowes Incorporated Method and system for remote feature enabling and disabling in a mailing system
US20060015500A1 (en) * 2004-07-13 2006-01-19 Pitney Bowes Incorporated System and method for securing database records from tampering and managing and recovering from component failure in devices such as postage value dispensing systems
US20060064590A1 (en) * 2004-09-17 2006-03-23 Gerrit Bleumer Method, processing devices and system for exchanging cryptography data
US7433847B2 (en) * 2004-09-22 2008-10-07 Pitney Bowes Inc. System and method for manufacturing and securing transport of postage printing devices
US20060085633A1 (en) * 2004-10-14 2006-04-20 Dirk Balfanz Using a portable security token to facilitate cross-certification between ceritification authorities

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150135299A1 (en) * 2012-05-21 2015-05-14 Zte Corporation Method and system for establishing ipsec tunnel
US9603019B1 (en) 2014-03-28 2017-03-21 Confia Systems, Inc. Secure and anonymized authentication
WO2015195751A1 (en) * 2014-06-19 2015-12-23 Microsoft Technology Licensing, Llc Securing communications with enhanced media platforms
US9413738B2 (en) 2014-06-19 2016-08-09 Microsoft Technology Licensing, Llc Securing communications with enhanced media platforms
CN106464739A (en) * 2014-06-19 2017-02-22 微软技术许可有限责任公司 Securing communications with enhanced media platforms
US9813403B2 (en) 2014-06-19 2017-11-07 Microsoft Technology Licensing, Llc Securing communications with enhanced media platforms
US9602292B2 (en) * 2015-07-25 2017-03-21 Confia Systems, Inc. Device-level authentication with unique device identifiers
US10484359B2 (en) 2015-07-25 2019-11-19 Confia Systems, Inc. Device-level authentication with unique device identifiers
US10341118B2 (en) * 2016-08-01 2019-07-02 A10 Networks, Inc. SSL gateway with integrated hardware security module
US20220166636A1 (en) * 2019-03-14 2022-05-26 Omron Corporation Control device and control system
US11855965B1 (en) * 2019-07-30 2023-12-26 Cyber Ip Holdings, Llc Traceless access to remote deployed devices in undisclosed locations
CN113347148A (en) * 2021-04-20 2021-09-03 北京信安世纪科技股份有限公司 Electronic authentication method and system

Also Published As

Publication number Publication date
EP1941648A4 (en) 2011-12-07
EP1941648A2 (en) 2008-07-09
WO2007044239A2 (en) 2007-04-19
WO2007044239A3 (en) 2007-11-08
US8046579B2 (en) 2011-10-25

Similar Documents

Publication Publication Date Title
US8046579B2 (en) Secure gateway with redundent servers
US10153907B2 (en) Methods and systems for PKI-based authentication
US8621206B2 (en) Authority-neutral certification for multiple-authority PKI environments
Maughan et al. Internet security association and key management protocol (ISAKMP)
US8635446B2 (en) Distributed cryptographic management for computer systems
US6092200A (en) Method and apparatus for providing a virtual private network
CN103281190A (en) Systems and methods for secure workgroup management and communication
US20030061481A1 (en) Secure broadcast system and method
US11764975B2 (en) Method for validating a digital user certificate
Karbasi et al. A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks
EP1653387B1 (en) Password exposure elimination in Attribute Certificate issuing
US11134072B2 (en) Method for verifying a security classification of a first device using a digital certificate, a first and second device and certificate issuing apparatus
GB2555183A (en) Method for secure data management in a computer network
Maughan et al. RFC2408: Internet Security Association and Key Management Protocol (ISAKMP)
US20220232000A1 (en) Secure communication system
CN112615838B (en) Extensible block chain cross-chain communication method
US20220368688A1 (en) Secure communication system
CN110557365A (en) Safe single sign-on method based on message authentication code
Housley et al. Trust anchor management protocol (TAMP)
US20230171228A1 (en) Secure communication system
Adams et al. RFC3029: Internet X. 509 Public Key Infrastructure Data Validation and Certification Server Protocols
WO2024020585A1 (en) A secure communication system
CN116325651A (en) Payload assurance at multiple network boundaries
Fedorchak Reducing PKI related network load in bandwidth constrained environments
WO2022099077A1 (en) A secure communication system

Legal Events

Date Code Title Description
AS Assignment

Owner name: NEOPOST INDUSTRIE SA, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KRESINA, ROMAN;REEL/FRAME:017615/0670

Effective date: 20060216

AS Assignment

Owner name: NEOPOST INDUSTRIE SA, FRANCE

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE'S ADDRESS PREVIOUSLY RECORDED ON REEL 017615 FRAME 0670;ASSIGNOR:KRESINA, ROMAN;REEL/FRAME:018049/0482

Effective date: 20060216

Owner name: NEOPOST INDUSTRIE SA, FRANCE

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE'S ADDRESS PREVIOUSLY RECORDED ON REEL 017615 FRAME 0670. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT OF ASSIGNOR'S INTEREST;ASSIGNOR:KRESINA, ROMAN;REEL/FRAME:018049/0482

Effective date: 20060216

AS Assignment

Owner name: NEOPOST TECHNOLOGIES,FRANCE

Free format text: CHANGE OF NAME;ASSIGNOR:NEOPOST INDUSTRIE S.A.;REEL/FRAME:018286/0234

Effective date: 20060511

Owner name: NEOPOST TECHNOLOGIES, FRANCE

Free format text: CHANGE OF NAME;ASSIGNOR:NEOPOST INDUSTRIE S.A.;REEL/FRAME:018286/0234

Effective date: 20060511

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

ZAAA Notice of allowance and fees due

Free format text: ORIGINAL CODE: NOA

ZAAB Notice of allowance mailed

Free format text: ORIGINAL CODE: MN/=.

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

AS Assignment

Owner name: QUADIENT TECHNOLOGIES FRANCE, FRANCE

Free format text: CHANGE OF NAME;ASSIGNOR:NEOPOST TECHNOLOGIES;REEL/FRAME:062226/0973

Effective date: 20200623

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20231025